Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 17:42
Behavioral task
behavioral1
Sample
Bet.exe
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
Bet.exe
-
Size
77KB
-
MD5
0cc82efcede7f5764067f896b7a5049b
-
SHA1
3d0a7c61b27d6ffb96973dc81385d903ffe50905
-
SHA256
b0d124709d9eb4cf5097343e50eb1ca9785ce7fac3d4403907a3c626cbdd34b5
-
SHA512
032fd3c747c6447216fe80978573238a04622d801bc7ca66b81f48ef51e1fd554e14935da7d446ff68f981e39227002a8d091f87e96edd3301844207b066f88c
-
SSDEEP
1536:WqrR3YsyK3dnQfHYmsGHmHiLQHbghg5adYD6elEP2XRKOIxpEg:Wq1YsygpKHYqHmaQHbgaYdCufOI7Eg
Malware Config
Extracted
Family
xworm
Attributes
-
Install_directory
%AppData%
-
install_file
Sihost.exe
-
pastebin_url
https://pastebin.com/raw/hA5YVNf1
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2516-1-0x00000000008C0000-0x00000000008DA000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2516 Bet.exe